MindshaRE: Using Binary Ninja API to Detect Potential Use-After-Free Vulnerabilities
March 27, 2025 | Reno Robert CONTINUE READINGBlog post
Exploiting Untrusted Objects through Deserialization: Analyzing 1 of 100+ HPE Bug Submissions
- December 01, 2017